1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
4 years ago
7

Which of the following two operating systems are used most frequently on tablets? Select one: A. Android and iOS B. BlackBerry a

nd Windows C. Windows and iOS D. Windows and Android
Computers and Technology
2 answers:
zhuklara [117]4 years ago
4 0

Answer:

A. Android and iOS

Explanation:

The two most frequently used operating systems on the tablets are Android and iOS. They are most famous operating systems currently. ios is used by apple hence it's tablets also known as ipads are on ios and other companies like samsung,motorola ,lenovo,hp etc. uses Android operating system on tablets.

meriva4 years ago
4 0

The correct answer is A. Android and iOS

Explanation:

In technology, an operating system is a software or program that manages the applications, storage, and processws of a technological device such as a cellphone, tablet or computer, making possible the device works. Additionally, there are multiple operating systems available and some are preferred over others. In the case of tablets, the most common systems are Android and iOS. These are the most common because these two operating systems are designed for mobile devices such as cellphones or tablets while others such as Windows or macOS are designed for computers.

You might be interested in
You have been hired to develop the website for a popular speaker. He has asked that you include the PowerPoint slides from his l
amid [387]

The method would you suggest for including the slides on the website are:

  • First one need to Download WOWSlider and then register for it.
  • Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.
  • Then Export your slider.
  • You also need to add the slider to your own webpage.

<h3>What are the different ways of creating slides?</h3>

PowerPoint are known to be one that gives about different ways to create a presentation.

One can use Blank presentation, one can also used  other Design Template and also From AutoContent Wizard.

Note that in the case above, The method would you suggest for including the slides on the website are:

  • First one need to Download WOWSlider and then register for it.
  • Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.
  • Then Export your slider.
  • You also need to add the slider to your own webpage.

Learn more about slides from

brainly.com/question/24653274

#SPJ1

6 0
2 years ago
true or false if you type too much text on a powerpoint slide, the additional text is added to a second slide
Nady [450]
True I've had it happen alot
3 0
3 years ago
Read 2 more answers
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
When considering the purchase of a major software application, managers need to also consider the following potential downside:
Anastasy [175]

Answer:

The answer is B.The package seldom totally fits the company's needs

Explanation:

7 0
4 years ago
Host A and Host B are connected via a 10 Km, 100 Mbps link. Suppose A is transferring multiple 2 KB segments to B using rdt3.0.
stich3 [128]
ANSWER: Sender utilization
4 0
3 years ago
Other questions:
  • A(n) _____ can be used to convert digitized documents into ascii (american standard code for information interchange) text that
    6·1 answer
  • What skills and characteristics do you think would be necessary for a lighting board operator to be successful?
    8·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • If a computer is capable only of manipulating and storing integers, what di themselves? How are these difficulties overcome
    13·1 answer
  • What will you personally do to make your peers aware of the seriousness Of teen crashes?
    9·1 answer
  • Spoken word and written word are different because what
    9·1 answer
  • What tells the hardware what to do and how to do it?
    9·1 answer
  • What type of multimedia are live news feeds? Live news feeds are examples of ________ multimedia. 20 POINTS PLZ HELP
    5·2 answers
  • Help please I would really appreciate <br>​
    5·2 answers
  • What is computer generation​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!